A secure patient monitoring solution using wireless sensor networks
暂无分享,去创建一个
[1] K. V. Arya,et al. Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[2] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[3] Ranveer Chandra,et al. SNOW: Sensor Network over White Spaces , 2016, SenSys.
[4] Adam Dunkels,et al. Contiki - a lightweight and flexible operating system for tiny networked sensors , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[5] Aduwati Sali,et al. Node Replication Attacks in Mobile Wireless Sensor Network: A Survey , 2014, Int. J. Distributed Sens. Networks.
[6] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[7] Adam Dunkels. Rime - a lightweight layered communication stack for sensor networks. , 2007 .
[8] Avijit Mathur,et al. Healthcare WSN: Cluster Elections and Selective Forwarding Defense , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[9] Filippo Attivissimo,et al. A Smart Sensor Network for Sea Water Quality Monitoring , 2015, IEEE Sensors Journal.
[10] Kyung Sup Kwak,et al. An overview of IEEE 802.15.6 standard , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).
[11] Brian Meade,et al. A Guide to Data Protection Legislation for Irish General Practice , 2011 .
[12] John Viega,et al. The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.
[13] Yasir Arfat Malkani,et al. A framework for securing mobile wireless sensor networks against physical attacks , 2016, 2016 International Conference on Emerging Technologies (ICET).
[14] Hugo Krawczyk,et al. Cryptographic Extraction and Key Derivation: The HKDF Scheme , 2010, IACR Cryptol. ePrint Arch..
[15] P. Adams. Frequently Asked Questions: Find it @ DMU , 2005 .
[16] Ankit Thakkar,et al. Cluster Head Election for Energy and Delay Constraint Applications of Wireless Sensor Network , 2014, IEEE Sensors Journal.
[17] Li Xiao,et al. Securing Sensor Nodes Against Side Channel Attacks , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[18] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.
[19] Wen Gao,et al. Watermark detection schemes with high security , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[20] Fatang Chen,et al. Enhanced Key Derivation Function of HMAC-SHA-256 Algorithm in LTE Network , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.
[21] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[22] Ming-Yu Tsai,et al. A Virtual Cluster Head Election Scheme for Energy-Efficient Routing in Wireless Sensor Networks , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.
[23] Zhe Liu,et al. Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes , 2013, ICICS.
[24] Sana Ullah,et al. A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications , 2013, Int. J. Distributed Sens. Networks.
[25] Ashok Kumar Turuk,et al. A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).
[26] Aref Meddeb,et al. Optimal number of cluster heads for random topology WSNs using the stable election protocol , 2015, 2015 Global Summit on Computer & Information Technology (GSCIT).
[27] Ms. S. Sudha,et al. A Hospital Healthcare Monitoring System Using Wireless Sensor Networks , 2017 .
[28] Wael Guibène,et al. An evaluation of low power wide area network technologies for the Internet of Things , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[29] Steffen Lochmann,et al. Prototype of a secure wireless patient monitoring system for the medical community , 2011 .
[30] R. Mitra,et al. Improving wireless sensor network lifetime through power aware clustering technique , 2013, ARTCom 2013.
[31] Feng Wang,et al. Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches , 2011, IEEE Communications Surveys & Tutorials.
[32] Pallikonda Rajasekaran Murugan,et al. Sensor grid applications in patient monitoring , 2010, Future Gener. Comput. Syst..
[33] Samaher Al-Janabi,et al. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .
[34] Adam Dunkels,et al. Run-time dynamic linking for reprogramming wireless sensor networks , 2006, SenSys '06.
[35] Chang Liu,et al. Sensor-Based Random Number Generator Seeding , 2015, IEEE Access.
[36] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[37] Adam Dunkels,et al. Powertrace: Network-level Power Profiling for Low-power Wireless Networks , 2011 .
[38] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[39] Subhas Chandra. Medical IoT systems: architecture and security , 2017 .
[40] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[41] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[42] Adam Dunkels,et al. The ContikiMAC Radio Duty Cycling Protocol , 2011 .
[43] A. Rameez Mohammed,et al. Defense mechanism against selective forwarding attack in wireless sensor networks , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[44] Vincent F. Taylor,et al. Mitigating black hole attacks in wireless sensor networks using node-resident expert systems , 2014, 2014 Wireless Telecommunications Symposium.
[45] Jose A. Gutierrez. On the use of IEEE 802.15.4 to enable wireless sensor networks in building automation , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).
[46] Tongtong Li,et al. An energy efficient link-layer security protocol for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[47] Anurag Tewari,et al. Security and Privacy in E-Healthcare Monitoring with WBAN: A Critical Review , 2016 .
[48] Philippas Tsigas,et al. ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System , 2009, NordSec.
[49] JeongGil Ko,et al. MEDiSN: medical emergency detection in sensor networks , 2008, SenSys '08.
[50] Jangeun Jun,et al. MRP: Wireless mesh networks routing protocol , 2008, Comput. Commun..
[51] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[52] Chenyang Lu,et al. Reliable clinical monitoring using wireless sensor networks: experiences in a step-down hospital unit , 2010, SenSys '10.
[53] Avijit Mathur,et al. Cluster head election and rotation for medical-based wireless sensor networks , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).
[54] Avijit Mathur,et al. Medical WSN: Power, routing and selective forwarding defense , 2015, 2015 13th International Conference on Telecommunications (ConTEL).
[55] Reza Ebrahimi Atani,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.
[56] Victor Cionca. A framework for the security configuration of wireless sensor networks. , 2011 .
[57] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[58] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[59] D. McGrew,et al. The Galois/Counter Mode of Operation (GCM) , 2005 .
[60] Andrew H. Kemp,et al. A dynamic cluster head election protocol for mobile wireless sensor networks , 2015, 2015 International Symposium on Wireless Communication Systems (ISWCS).
[61] Nauman Aslam,et al. C-Sec: Energy efficient link layer encryption protocol for Wireless Sensor Networks , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[62] Mohamed F. Younis,et al. Load-balanced clustering of wireless sensor networks , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[63] Sean Turner,et al. Transport Layer Security , 2014, IEEE Internet Computing.
[64] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[65] Abdennaceur Kachouri,et al. Improved election of cluster heads in LEACH , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[66] Daojing He,et al. A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.
[67] Qijun Gu,et al. Denial of Service Attacks , 2012 .
[68] Thomas Watteyne,et al. OpenMote: Open-Source Prototyping Platform for the Industrial IoT , 2015, ADHOCNETS.
[69] Chiara Buratti,et al. On the performance of an IEEE 802.15.6 Wireless Body Area Network , 2011, EW.
[70] David Martins,et al. Steganography in MAC Layers of 802.15.4 Protocol for Securing Wireless Sensor Networks , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[71] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[72] Neelam Khemariya,et al. An Efficient Algorithm for Detection of Blackhole Attack in AODV based MANETs , 2013 .
[73] Mohamed-Lamine Messai. Classification of Attacks in Wireless Sensor Networks , 2014, ArXiv.
[74] Xingming Sun,et al. Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[75] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[76] Xiaorui Wang,et al. Geographic and energy-aware routing in Wireless Sensor Networks , 2009, Int. J. Ad Hoc Ubiquitous Comput..
[77] R. Saravanan,et al. A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.
[78] Avijit Mathur,et al. Medical WSN: Defense for selective forwarding attack , 2015, 2015 9th International Conference on Sensing Technology (ICST).
[79] Saleha Mubarak AlMheiri,et al. Data link layer security protocols in Wireless Sensor Networks: A survey , 2013, 2013 10th IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC).
[80] Sangita Chaudhari,et al. DoS Attack Prevention Technique in Wireless Sensor Networks , 2016 .
[81] Nikita V. Mahajan,et al. Securing Multipath Routing Protocol Using Authentication Approach for Wireless Sensor Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[82] Raymond Chi-Wing Wong,et al. On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas , 2013, Int. J. Distributed Sens. Networks.
[83] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[84] V. Milutinovic,et al. A survey of military applications of wireless sensor networks , 2012, 2012 Mediterranean Conference on Embedded Computing (MECO).
[85] Dauda Ayanda. Optimal Load Distribution in Wireless Sensor Networks: A Reliable Clustering Algorithm Approach , 2014 .
[86] Sule Yildirim Yayilgan,et al. Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[87] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[88] Avijit Mathur,et al. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT , 2016, Sensors.
[89] Kasim M. Al-Aubidy,et al. Real-time patient health monitoring and alarming using wireless-sensor-network , 2016, 2016 13th International Multi-Conference on Systems, Signals & Devices (SSD).
[90] Sofie Pollin,et al. Chirp spread spectrum as a modulation technique for long range communication , 2016, 2016 Symposium on Communications and Vehicular Technologies (SCVT).
[91] Praveen Budhwar,et al. TinyOS: An Operating System for Wireless Sensor Networks , 2015 .
[92] Habib Youssef,et al. Security architecture for at-home medical care using Wireless Sensor Network , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[93] 辻見 裕史. 低消費電力&短時間接続!シリアルはワイヤレスに Bluetoothの素を使いこなせ 最新4.0 Low Energy対応!即席I/Oアダプタ基板&ファームウェア (特集 スマホでもカンタンI/O!手の届かないチョコット先をリモート操縦 最新Low Energyモードもバッチリ!コイン電池ひとつで1年間! Bluetooth無線初体験!) -- (オリジナル・アプリ作るならコレ 電気屋で1,000円そこそこ LEモード対応!ドングル+部品10個で作る簡単I/Oアダプタ : 通信処理の始めから終わりまでを徹底解説) , 2013 .
[94] Marek Neruda,et al. The issue of LPWAN technology coexistence in IoT environment , 2016, 2016 17th International Conference on Mechatronics - Mechatronika (ME).
[95] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[96] Hugo V. Bitencourt,et al. Simulation Domains for Networked Embedded Systems , 2012 .
[97] Elfed Lewis,et al. A Lightweight Classification Algorithm for External Sources of Interference in IEEE 802.15.4-Based Wireless Sensor Networks Operating at the 2.4 GHz , 2014, Int. J. Distributed Sens. Networks.
[98] Avijit Mathur,et al. A secure end-to-end IoT solution , 2017 .
[99] Xianbin Wang,et al. Marine environment monitoring using Wireless Sensor Networks: A systematic review , 2014, 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[100] V. C. Gungor,et al. Wireless sensor networks for structure health monitoring: recent advances and future research directions , 2011 .
[101] Muneer Bani Yassein,et al. Smart homes automation using Z-wave protocol , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[102] Hyung Yun Kong,et al. Energy efficient cooperative LEACH protocol for wireless sensor networks , 2010, Journal of Communications and Networks.
[103] Thomas C. Schmidt,et al. RIOT OS: Towards an OS for the Internet of Things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[104] Habib Youssef,et al. Secure Data Transmission Protocol for Medical Wireless Sensor Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[105] Tobias Reusing,et al. Comparison of Operating Systems TinyOS and Contiki , 2012 .
[106] Ludwig Seitz,et al. S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.
[107] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[108] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[109] Veltech Multitech. HUMAN HEALTH MONITORING USING WIRELESS SENSORS NETWORK (WSN) , 2013 .
[110] Peter Xiaoping Liu,et al. Data gathering communication in wireless sensor networks using ant colony optimization , 2004, 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[111] Thomas Newe,et al. Trust security mechanism for maritime wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..